期刊文献+

基于DBN的计算系统动态安全分析模型

Novel Dynamic Security Analysis Model for Computing System Based on DBN
下载PDF
导出
摘要 计算系统脆弱性分析是系统安全领域研究的热点问题之一。随着多核技术的出现,计算系统呈现开放性和动态性的特征。有鉴于此,在研究现有系统安全风险分析的基础上,提出了面向动态计算系统的安全分析模型,它利用动态贝叶斯网络构建攻击图,以解决计算系统脆弱性动态转移的问题。最后,以虚拟计算系统为实例验证了所提方法的效率和性能。实例仿真表明,该方法是动态系统安全风险分析的一种新的有效途径。 In recent years,computing system vulnerability analysis attracts more and more researchers, which has be- come a hot spot in the field of system security. With the emergence of multi-core technology, computing systems become more open and dynamic. An attack graph-based dynamic security analysis model was proposed, which can measure com- bined effect of dynamic computing system vulnerabilities. An improved attack map generation algorithm was also pre- sented to improve performance and simplify further security analysis by system administrators. Moreover,a virtual com- puting system-based example shows the analysis process of the proposed method and validates its efficiency and per- formance. The experimental results show that our method is an effective way to dynamic system security risk analysis.
出处 《计算机科学》 CSCD 北大核心 2010年第2期61-64,共4页 Computer Science
基金 国家自然科学基金(60803114) 国家重点基础研究发展计划(973项目2007CB310900)资助
关键词 系统安全 安全分析 攻击图 动态贝叶斯网络 System security,Security analysis,Attack graph,Dynamic baysian network
  • 相关文献

参考文献15

  • 1Swiler L,Phillips C,Gaylor T. A graph-based network-vulnerability analysis system[R]. SAND 97-3010/1. 1998.
  • 2Sheyner O, Haines J, Lippmann R, et al. Automated generation and analysis of attack graphs[C]//Proceeding of the 2002 IEEE Symposium on Security and Privacy. Oakland, CA, May 2002.
  • 3Mell P, Scarfone K, Romanosky S. Common Vulnerability Scoring System[J]. IEEE Security & Privacy, 2006,4 (6) : 85-89.
  • 4Suvajit G,Winstead J. Using Attack Graphs to Design Systems [J]. IEEE Security & Privacy,2007,5(4):80-83.
  • 5Frigault M, Wang L. Measuring Network Security Using Baye - sian Network-based Attack Graphs [C]//Proceedings of the 32nd Annual IEEE International Computer Sohware and Applications Conference (COMPSAC2008). August 2008 : 698-703.
  • 6Frigault M,Wang L,Singhal A, et al. Measuring Network Security Using Dynamic Bayesian Networks[C]//Proceedings of the 4th ACM Workshop on Quality of Protection. Alexandria, Virginia, USA, October 2008 : 23-30.
  • 7冯萍慧,连一峰,戴英侠,鲍旭华.基于可靠性理论的分布式系统脆弱性模型[J].软件学报,2006,17(7):1633-1640. 被引量:30
  • 8王永杰,鲜明,刘进,王国玉.基于攻击图模型的网络安全评估研究[J].通信学报,2007,28(3):29-34. 被引量:54
  • 9贾炜,连一峰,冯登国,陈思思.基于贝叶斯网络近似推理的网络脆弱性评估方法[J].通信学报,2008,29(10):191-198. 被引量:13
  • 10Chen J, Greiner R, Kelly J, et al. Learning Bayesian networks from data:An information-theory based approach[J]. Artificial Intelligence, 2002,137 ( 1/2 ) : 43-90.

二级参考文献47

  • 1冯萍慧,连一峰,戴英侠,鲍旭华.基于可靠性理论的分布式系统脆弱性模型[J].软件学报,2006,17(7):1633-1640. 被引量:30
  • 2Dacier M,Deswarte Y,Kaaniche M.Quantitative assessment of operational security models and tools.Technical Report,96493,LAAS,1996.
  • 3Ortalo R,Deswarte Y.Information systems security:Specification and quantitative evaluation.Technical Report,DeVa ESPRIT Long Term Research Project No.20072,the 2nd Year Report,LAAS-CNRS & INRIA,1997.561-584.
  • 4Ortalo R,Deswarte Y,Ka(a)niche M.Experimenting with quantitative evaluation tools for monitoring operational security.IEEE Trans.on Software Engineering,1999,25(5):633-650.
  • 5Swiler LP,Phillips C,Gaylor T.A graph-based network-vulnerability analysis system.Technical Report,SANDIA Report No.SAND 97-3010/1,1998.
  • 6Sheyner O.Scenario graphs and attack graphs[Ph.D.Thesis].Pittsburgh:Carnegie Mellon University,2004.
  • 7Sheyner O,Haines J,Jha S,Lippmann R,Wing JM.Automated generation and analysis of attack graphs.In:Hinton H,Blakley B,Abadi M,Bellovin S,eds.Proc.of the IEEE Symp.on Security and Privacy.Oakland:IEEE Computer Society Press,2002.273-284.
  • 8Jha S,Sheyner O,Wing JM.Minimization and reliability analyses of attack graphs.Technical Report,CMU-CS-02-109,Carnegie Mellon University,2002.
  • 9Cimatti A,Clarke E,Giunchiglia F,Roveri M.NuSMV:A new symbolic model verifier.In:Halbwachs N,Peled D,eds.Proc.of the 11th Conf.on Computer-Aided Verification (CAV'99).LNCS 1633,Trento:Springer-Verlag,1999.495-499.
  • 10Gansner ER,North SC.An open graph visualization system and its applications to software engineering.Software-practice and Experience,1999,30(11):1203-1233.

共引文献95

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部